Artículos de revistas sobre el tema "Hackers"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hackers".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Texto completoOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Texto completoBátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Texto completoHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Texto completoCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Texto completoGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Texto completoAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Texto completoScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.
Texto completoBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Texto completoBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Texto completoBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Texto completoKulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Texto completoIsnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.
Texto completoWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Texto completoLaksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.
Texto completoManik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.
Texto completoWu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.
Texto completoAl-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.
Texto completoMaxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.
Texto completoJeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (2014): 38–42. http://dx.doi.org/10.1145/2604998.
Texto completoHollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (1991): 6–17. http://dx.doi.org/10.1145/122246.122248.
Texto completoWark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.
Texto completoDudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.
Texto completoAguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.
Texto completoEtuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.
Texto completoUlrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.
Texto completoTurgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.
Texto completoHathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.
Texto completoButler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.
Texto completoStephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.
Texto completoCrawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.
Texto completoBall, Philip. "Medical hackers." Lancet 388, no. 10044 (2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.
Texto completoHighland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.
Texto completoSchneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.
Texto completoKera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.
Texto completoMartínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.
Texto completoLange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.
Texto completoAsarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.
Texto completoAji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.
Texto completoFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Texto completoMohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.
Texto completoPrasetyo, Stefanus Eko, Haeruddin Haeruddin, and Kelvin Ariesryo. "Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 1 (2024): 27–36. http://dx.doi.org/10.35457/antivirus.v18i1.3339.
Texto completoCheng, Xiaogang, Ren Guo, and Yonghong Chen. "Randomized quantum oblivious transfer with application in hacker-resistant computation." International Journal of Quantum Information 16, no. 04 (2018): 1850039. http://dx.doi.org/10.1142/s0219749918500399.
Texto completoEsquivel-Sada, Daphne. "Les matériaux vivants entre les mains hackers." Matériaux vivants 49 (2024): 81–98. http://dx.doi.org/10.4000/11yyb.
Texto completoNikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.
Texto completoScariot Esquivel, Nelson. "¿Qué es ser hacker?" Question/Cuestión 3, no. 71 (2022): E661. http://dx.doi.org/10.24215/16696581e661.
Texto completoPradana Aji, Rio, Yudi Prayudi, and Ahmad Luthfi. "ANALYSIS OF BRUTE FORCE ATTACK LOGS TOWARD NGINX WEB SERVER ON DASHBOARD IMPROVED LOG LOGGING SYSTEM USING FORENSIC INVESTIGATION METHOD." Jurnal Teknik Informatika (Jutif) 4, no. 1 (2023): 39–48. http://dx.doi.org/10.52436/1.jutif.2023.4.1.644.
Texto completoHolt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.
Texto completoFitroh, Qorry Aina, and Bambang Sugiantoro. "PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS." JURNAL ILMIAH INFORMATIKA 11, no. 01 (2023): 27–31. http://dx.doi.org/10.33884/jif.v11i01.6593.
Texto completoGoldstein, Gordon, and Laurent Saintonge. "Les États hackers." Books N° 64, no. 4 (2015): 37–38. http://dx.doi.org/10.3917/books.064.0037.
Texto completo